A book-in-progress about the linux kernel and its insides.The goal is simple - to share my modest knowledge about the insides of the linux kernel and help people who are interested in linux kernel insides, and other low-level subject matter. - @0xAXArchived by Unglue.it Topic: linux
Advances in Computer Systems Architecture: 9th Asia-Pacific Conference, ACSAC 2004, Beijing, China, September 7-9, 2004. ProceedingsAuthor: Pen-Chung Yew, Jingling Xue Published by Springer Berlin Heidelberg ISBN: 978-3-540-23003-8 DOI: 10.1007/b100354Table of Contents:Some Real Observations on Virtual Machines Replica Victim Caching to Improve Reliability of In-Cache Replication Efficient Victim Mechanism on Sector Cache Organization Cache Behavior Analysis of a Compiler-Assisted Cache... Topic: Computer architecture
byChen, Kefei, 1959-; Xiao, G. (Guozhen), 1934-; International Workshop on Progress on Cryptography (2004 : Shanghai, China)
Progress on Cryptography: 25 Years of Cryptography in ChinaAuthor: Kefei Chen Published by Springer US ISBN: 978-1-4020-7986-3 DOI: 10.1007/b116807Table of Contents:Randomness and Discrepancy Transforms Legendre Sequences and Modified Jacobi Sequences Resilient Functions with Good Cryptographic Properties Differential Factoring for Integers Simple and Efficient Systematic a-Codes from Error Correcting Codes On Coefficients of Binary Expression of Integer Sums A New Publicly Verifiable Proxy... Topics: Computer security, Cryptography
byColmenarez, Antonio J. (Antonio José); Xiong, Ziyou; Huang, Thomas S., 1936-
Facial Analysis from Continuous Video with Applications to Human-Computer InterfaceAuthor: Antonio J. Colmenarez, Ziyou Xiong, Thomas S. Huang Published by Springer US ISBN: 978-1-4020-7802-6 DOI: 10.1007/b101848Table of Contents:Introduction Information-based Maximum Discrimination Face and Facial Feature Detection Face and Facial Feature Tracking Face and Facial Expression Recognition 3-D Model-based Image Communication Implementations, Experiments and Results Application in an Audio-visual... Topics: Human-computer interaction, Image processing, Computer vision
Coding, Cryptography and CombinatoricsAuthor: Keqin Feng, Harald Niederreiter, Chaoping Xing Published by Birkhäuser Basel ISBN: 978-3-0348-9602-3 DOI: 10.1007/978-3-0348-7865-4Table of Contents:On the Secondary Constructions of Resilient and Bent Functions Adaptive Recursive MLD Algorithm Based on Parallel Concatenation Decomposition for Binary Linear Codes Modularity of Asymptotically Optimal Towers of Function Fields A New Correlation Attack on LFSR Sequences with High Error Tolerance LDPC... Topics: Computer science, Data structures (Computer science), Coding theory, Combinatorial analysis, Coding...
Packaging of High Power Semiconductor LasersAuthor: Xingsheng Liu, Wei Zhao, Lingling Xiong, Hui Liu Published by Springer New York ISBN: 978-1-4614-9262-7 DOI: 10.1007/978-1-4614-9263-4Table of Contents:Introduction of High Power Semiconductor Lasers Overview of High Power Semiconductor Laser Packages Thermal Design and Management in High Power Semiconductor Laser Packaging Thermal Stress in High Power Semiconductor Lasers Optical Design and Beam Shaping in High Power Semiconductor Lasers... Topics: Energy, Energy Systems
Astronomy Across Cultures: The History of Non-Western AstronomyAuthor: Helaine Selin, Sun Xiaochun Published by Springer Netherlands ISBN: 978-94-010-5820-9 DOI: 10.1007/978-94-011-4179-6Table of Contents:Sky Tales and Why We Tell Them Astronomy and Prehistory Astronomy and the Dreaming: The Astronomy of the Aboriginal Australians Useful and Conceptual Astronomy in Ancient Hawaii Ancient Astronomical Monuments in Polynesia A Polynesian Astronomical Perspective: The Maori of New Zealand The... Topics: Physics, History, Regional planning, History, Physics, Regional planning
Dear infowriting staff: Attached in a new internet booklet complete with title page that literally spells out the "lies" of the capitalist megamatrix. ( Please see the cover graphic ) " The full decoding of President Barack [Hussein] Obama concerning the international capitalist class's agenda for more war, a global prison state, and "New World Order" based on decades of lies, finance fraud, and brutality. Humor is often the best medicine.... " It contains some of... Topics: Worldwide Political Deceptions, WPD, Obama 2010, Mass Political Deceptions, Obama 2011, Obama, 2012
Lisa Harper Interview 1-12-2012 with Jesse Stevens of Hometown Family Radio talking about the upcoming womens winter retreat to be held on Jan. 28th 2012 at the McCook City Auditorium Topic: Lisa Harper Interview 1-12-2012
A three chapter manga comic, about the exploration of a mansion.Released for free sharing under a Creative Commons Attribution-Non Commercial-No Derivatives licence. Topics: hetaoni, manga, cc, byncnd, by-nc-nd, comic
Gene TherapyAuthor: Kleanthis G. Xanthopoulos Published by Springer Berlin Heidelberg ISBN: 978-3-642-72162-5 DOI: 10.1007/978-3-642-72160-1Table of Contents:A Few Glances at the Function of Chromatin and Nuclear Higher-Order Structure in Transcription Regulation Transcriptional Regulation and Gene Expression in the Liver Modeling Genetic Diseases in the Mouse The Use of Genetic Switches for the Generation of Conditional Mutants at the Level of Cells and Animals Application of Tetracycline... Topics: Medicine, Human genetics, Oncology, Cytology, Cytology, Human genetics, Medicine, Oncology
Software security vulnerabilities are a major threat for software systems. In the worst case, vulnerabilities in software enable users to gain unauthorized access or unauthorized control of an application. A large amount of software security vulnerability exploits such as buffer overflows, SQL injections, cross-site scripting attacks, etc. are caused by data flowing from untrusted program input sources into sensible program functions. We define a tainted path as a program execution path from an... Topics: static analysis, software security, taint analysis, c++, llvm, Xavier NOUMBISSI NOUNDOU, program...
Software vulnerabilities are security threats that exist in an appli-cation and may enable users to exercise unauthorized control of theprogram through supplied input. Unauthorized control of an appli-cation may be gained using techniques such as buffer overflow, SQLinjection, cross site scripting, etc. Checking for software vulnera-bilities in the context of web applications has become extremelyimportant as businesses observe an increasing reliance on web ap-plications. This paper presents a... Topics: dynamic taint analysis, program analysis, PHP, Java, Servlets, Quercus PHP interpreter
Xenophon's Cyropaedia, or Life of Cyrus, Translated from Greek by Henry Graham Dakyns, revised by F. M. Stawell. Xenophon (B.C. 431-354), a general and student of Socrates, wrote this historical romance using information about Cyrus the Great of Persia (ca. B.C. 559-530) as a vehicle for describing his own conception of an ideal state. Although not accurate history as is the Anabasis--Xenophon's other historical work about the East--this gem contains some probably accurate historical details... favoritefavoritefavoritefavorite ( 1 reviews ) Topics: Xenophon, Literature, Historical, Romance, Persia, Persian, Iran, Iranian, Cyrus the Great, Asia...
Xenophon's Anabasis, or March Up Country, translated from Greek by H. G. Dakyns (New York, 1890). Xenophon (B.C. 431-354), a general and student of Socrates, led an army of 10,000 Greek mercenaries to Babylon to aid the Persian Cyrus, who was trying to seize the throne from Shah Artaxerxes (B.C. 405-359). Cyrus was defeated and died, leaving Xenophon stranded. He was obliged to lead his soldiers back home through hostile territory (between 401 B.C. and March 399 B.C.). The route he took was... Topics: Xenophon, Greek Antiquities, Ancient History, Ancient Asia Minor, Syria, Mesopotamia, Armenia,...
Theresa Montierros Film Review The Heat Despite coming out the same year as another movie with more or less exactly the same plot (Megamind), 2010's Despicable Me felt like a breath of fresh air in a family-friendly CGI film landscape dominated by sassy animals and talking cars. The sequel can't quite replicate that sense of discovery but should satisfy the young target audience. Reformed supervillain Gru (voiced in a broad European accent by comedy superstar Steve Carell) has settled into his... favoritefavoritefavoritefavoritefavorite ( 6 reviews ) Topic: Theresa Montierros Film Review The Heat
Preservation and exhibition project at New Museum July 17- September 8, 2013. Wiring diagrams and equipment specifications for video preservation stations 1 and 2, (U-Matic, BetacamSP, VHS, MiniDV, DVCAM, Hi8) Topics: New Museum, XFR STN, XFRSTN, video, preservation, digitization, diagrams, umatic, vhs, visual,...
byXianbing Liu, Leina Wang, Yanli Dong, Jie Yang, Cunkuan Bao
This paper describes case studies on green supply chain management (GSCM) of three companies based in the Yangtze River delta of China. After clarifying major supply chain relationships of each company, we identified their internal and external GSCM practices. The corresponding changes of environmental and economic performances are summarized quantitatively or in a narrative manner. The case studies confirm that the multinational and foreign-funded companies have more active GSCM practices than... Topics: Green supply chain management, case study, China
In this note, we present a simple approach to calculate the time of blowing up along the curve and surface contracting flow. Our approach dependents on the famous theorem of turning tangents, Gauss-Bonnet Theorem and Willmore Theorem. We also prove that the rotation index of a closed curve and the Euler characteristic of a closed surface are constants along the curve and surface contracting flow. Topics: curve contracting flow, surface contracting flow
From Personal Digital Archiving 2015, hosted by NYU’s Moving Image Archiving and Preservation (MIAP) program, in collaboration with NYU Libraries and Coalition for Networked Information (CNI). Topics: PDA, 2015, PDA 2015, Personal Digital Archiving 2015, Besser, Ubois, NYU, MIAP, CNI, Cliff Lynch,...
byXIAO BING ILLUSTRATED BY LU YANGUANG AND CHEN WANZIANG
CHINESE CHILDREN'S BOOK IN ENGLISH, KIDS LITERATURE, FICTION, ILLUSTRATED BOOK, CHINESE, BEGINNING SCIENCE Topics: CHINESE CHILDREN'S BOOK IN ENGLISH, KIDS LITERATURE, FICTION, ILLUSTRATED BOOK, CHINESE
Saturated free fatty acids-induced hepatocyte lipoapoptosis plays a pivotal role in non-alcoholic steatohepatitis. Theactivation of endoplasmic reticulum (ER) stress is involved in hepatocyte lipoapoptosis induced by the saturated free fatty acidpalmitate (PA). However, the underlying mechanisms of the role of ER stress in hepatocyte lipoapoptosis remain largely unclear.In this study, we showed that PA and tunicamycin (Tun), a classic ER stress inducer, resulted in differential activation of... Topics: ER Stress, Palmitate, Hepatocyte Lipoapoptosis, GRP78
The behavior of flow between two coaxial frustum cones, with the inner one rotating and the outer stationary, is studied in this paper. It is found that the fluid at the outlet does not flow out directly, but flows up till a certain height. This reflux generates a vortex area with a quite large velocity and pressure magnitude. This reflux area, between Z/H = 0.05 and 0.30, has the trend to move up with increasing Reynolds number Re. The velocity magnitude is linear in the radial direction if... Topics: Frustum cone, Reynolds number, Stability, Vortex
Global approximation substitute for the original model is also called response surface (RS), surrogate or meta-model. The key aspects should be considered when using the RS approximation method: the accuracy of the RS, the number of original model evaluations, the time consuming when updating the RS, the memory space occupied by the RS, and the speed of evaluation for a given point using the RS. This paper analyzes the drawbacks of the existing response surface methods, and then proposes an... Topics: global approximation, polynomial response surface
The electrochemical method is a promising technology for aclean environmental and is widely applied in the control ofwastewater pollution, especially in the removal of metal andoxidation of refractory organics. The heavy metal wastewatertreated by the electrochemical method is reviewed in thisliterature. The key and challenges of the application of theelectrochemical method in the control of heavy metalwastewater are pointed out. Topics: Electrochemical Oxidation, Heavy Metal, Cyanide, Complex Metal, Organic Pollutants, Wastewater
Computing System Reliability: Models and AnalysisAuthor: Min Xie, Yuan-Shun Dai, Kim-Leng Poh Published by Springer US ISBN: 978-0-306-48496-4 DOI: 10.1007/b100619Table of Contents:Introduction Basic Reliability Concepts and Analysis Models for Hardware System Reliability Models for Software Reliability Models for Integrated Systems Availability and Reliability of Distributed Computing Systems Reliability of Grid Computing Systems Multi-state System Reliability Optimal System Design and... Topic: Electronic digital computers